Sei sulla pagina 1di 14

2

1 State three features of a typical operating system.

1 ......................................................................................................................................................

.........................................................................................................................................................

2 ......................................................................................................................................................

.........................................................................................................................................................

3 ......................................................................................................................................................

..................................................................................................................................................... [3]

2 Many companies across the world have increasingly introduced computer systems into the office
environment. This has had a big effect on employees.

(a) Identify three ways in which this new technology has affected employees. In each case,
explain why it has had an impact.

1 ...............................................................................................................................................

..................................................................................................................................................

impact ......................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

impact ......................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

impact ......................................................................................................................................

..................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2014
3

(b) Describe two health risks associated with increased use of computers.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

3 The following five statements about Internet security are incomplete:

(i) Illegal access to a computer system is known as < - - - - (a) - - - - >.

(ii) < - - - - (b) - - - - > are programs that self-replicate (copy themselves) and are designed to
disrupt computer systems.

(iii) < - - - - (c) - - - -> is where a user is sent legitimate-looking emails; as soon as the email is
opened and the recipient clicks on the embedded link, they are sent to a fake website.

(iv) Software that monitors key presses on a user’s keyboard, and relays the information back to
the person who sent the software, is known as < - - - - (d) - - - - >.

(v) < - - - - (e) - - - - > is malicious code or software installed on the hard drive of a user’s
computer or on a web server; the code or software will re-direct the user to a fake website
without their knowledge.

Complete the five statements using words from the following list:

• cookies
• hacking
• pharming
• phishing
• spam
• spyware
• viruses
• web browsers

(a) .................................................................................................................................................[1]

(b) .................................................................................................................................................[1]

(c) .................................................................................................................................................[1]

(d) .................................................................................................................................................[1]

(e) .................................................................................................................................................[1]

© UCLES 2014
4

4 Six statements and six values are shown below.

Each statement will generate one possible value.

Draw a line to link each statement to its correct value.

statement value
number of times the following
loop operates:
count = 1 1
repeat
input x
count = count + 1
until count = 5

4
the number of bits that make up
a byte

base 10 (denary) value of the 5


following binary number:
32 16 8 4 2 1
0 0 1 1 1 1

the number of tracks on the 8


single side of a CD-R

number of minutes to upload a


10
75 Mbyte file at 2 megabits/
second upload speed

If there are 2 bytes in a Kbyte,


X

what is the value of X? 15

[5]

© UCLES 2014
6

6 The following section of a pseudocode algorithm should:

• input 500 numbers


• generate a ratio called k
• output each value of k
• output how many numbers were larger than 10

10 total = 1
20 FOR x = 1 TO 500
30 IF number < 10 THEN total = total + 1
40 k = x / number
50 x = x + 1
60 OUTPUT k
70 NEXT x
80 OUTPUT x

(a) There are five errors in the above code.

Locate these errors and suggest a correction.

error 1 .......................................................................................................................................

correction ..................................................................................................................................

...................................................................................................................................................

error 2 .......................................................................................................................................

correction ..................................................................................................................................

...................................................................................................................................................

error 3 .......................................................................................................................................

correction ..................................................................................................................................

...................................................................................................................................................

error 4 .......................................................................................................................................

correction ..................................................................................................................................

...................................................................................................................................................

error 5 .......................................................................................................................................

correction ..................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2014
7

(b) The corrected algorithm was converted to a computer program and run. However, after
several numbers were input, the program stopped and an error message was generated,
showing that there was a further error at line 40 (k = x / number).

State what could cause this error to occur.

...................................................................................................................................................

...................................................................................................................................................

Suggest a change to line 40 to overcome this problem.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014
8

7 A digital camera contains a microprocessor. The camera’s specification includes:

• 20 megapixel resolution
• 32 gigabyte memory card
• autofocus facility

(a) A more expensive model of the camera has 40 megapixel resolution.

(i) Describe one advantage of increasing the resolution.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe one disadvantage of having 40 megapixel resolution.

...........................................................................................................................................

.......................................................................................................................................[1]

(b) (i) Describe the type of memory used in the memory card.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Give one benefit of using this type of memory.

...........................................................................................................................................

.......................................................................................................................................[1]

(c) (i) What is the meaning of the term pixel?

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) If a compressed image file requires an average of 1 byte per pixel, what is the maximum
number of photos that can be stored on the memory card?

...........................................................................................................................................

.......................................................................................................................................[1]

(d) Apart from autofocus, describe one other feature you would expect to see on a digital camera
controlled by a microprocessor.

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2014
9

8 The doors on a train are opened and closed automatically. Motors are used to operate the doors.
The system is controlled by a microprocessor.

Each door has a sensor which detects if a passenger enters or leaves the train as the doors are
closing. If a passenger is detected, the doors are automatically re-opened.

(a) Name a sensor which could be used to detect a passenger.

...............................................................................................................................................[1]

(b) If the sensor in one of the doors fails, describe a safety mechanism to prevent injury to a
passenger.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Describe how the sensors, microprocessor and door motors interact to ensure a passenger
is not trapped in a closing door.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014
12

10 (a) The flowchart on the next page shows how barcodes are used in a supermarket to find
product information and to produce orders for new stock automatically. Several statements
are missing from the flowchart.

Complete the flowchart, using item numbers only from the list below.

Item
Description
number

1 is barcode found?

2 is barcode read?

3 is flag for this product = 1?

4 is number in stock <= re-order value?

5 key in the barcode manually

6 locate price and product information from file

7 output an error message

8 output order request for new stock

9 output receipt and itemised bill

10 reduce number in stock by 1 and write new value back to the record

11 search database for barcode

12 set flag for this product to 1

© UCLES 2014
13

START

No any more
barcodes to
scan?

Yes

scan barcode

STOP
No

Yes

No

Yes

Yes No

No Yes

[8]

© UCLES 2014
14

(b) Two devices used by the supermarket Point-Of-Sale (POS) terminal are a barcode reader
and a keyboard.

Name two other input/output devices used at the POS and give a use for each device.

device 1 ....................................................................................................................................

use ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

device 2 ....................................................................................................................................

use ............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

input number of
2
carats of gold

input weight of the


3
jewellery (in grams)

actual weight of gold


4
(grams)

input value of gold


5
($ per gram)

total value of gold


6
($)

Values are input into cells B2, B3 and B5 and output is shown in cells C4 and C6.
© UCLES 2014
18

13 (a) Complete the truth table for the following logic circuit:

A B C Working X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

© UCLES 2014
19

(b) Re-draw the logic circuit shown opposite, using NAND and NOR gates only.

[2]

(c) Write a logic statement that describes the following logic circuit:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2014
20

14 Study the following flowchart very carefully.

START

sum1 = 0
sum2 = 0

total = 0

INPUT a, b, c, d, e, f

Yes
is a = 0 and STOP
b = 0?

No

sum1 = a*6 + b*5 + c*4

sum2 = d*3 + e*2 + f*1

total = sum1 + sum2

total = total – 11

Yes
is total = 0? OUTPUT “data are OK”

No

No Yes
is total < 0? OUTPUT “error”

© UCLES 2014
21

Complete the trace table for this flowchart using the following data:

4, 3, 2, 0, 0, 8

5, 0, 1, 2, 3, 4

0, 0, 0, 0, 0, 0

sum1 sum2 total a b c d e f OUTPUT

[5]

© UCLES 2014

Potrebbero piacerti anche